A+ Guide to Software, 4e Chapter 9 Windows on the Internet.

Slides:



Advertisements
Similar presentations
IS 247 Introduction to Web Application Development Tim Wu.
Advertisements

Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
Layer 7- Application Layer
Internet…issues Managing the Internet
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Introduction To Networking
Wi-Fi Structures.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
網際網路協定基礎介紹 Data Communications and Computer Networks: A Business User’s Approach Fifth Edition (Chap 10)
Chapter 15 Networks.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
A+ Guide to Software, 4e Chapter 11 Supporting Printers and Scanners.
Remote Networking Architectures
Network Address Translation, Remote Access and Virtual Private Networks BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
©Brooks/Cole, 2003 Chapter 6 Computer Networks. ©Brooks/Cole, 2003 Understand the rationale for the existence of networks. Distinguish between the three.
A+ Guide to Managing and Maintaining Your PC, 7e Chapter 18 Networking Practices.
Chapter Eleven An Introduction to TCP/IP. Objectives To compare TCP/IP’s layered structure to OSI To review the structure of an IP address To look at.
Chapter 15 Networks. Chapter Goals Types of networks Topologies Open Systems Home Internet connections 15-2.
Guide to Operating System Security Chapter 9 Web, Remote Access, and VPN Security.
Cisco Discovery Working at a Small-to-Medium Business or ISP CHAPTER 7 ISP Services Jr.
A+ Guide to Managing and Maintaining your PC, 6e Chapter 10….. PCs on the Internet.
Guide to MCSE , Second Edition, Enhanced1 Windows XP Network Overview Most versatile Windows operating system Supports local area network (LAN) connections.
PC Maintenance: Preparing for A+ Certification Chapter 25: The Internet.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Hands-On Microsoft Windows Server 2003 Networking Chapter Three TCP/IP Architecture.
Lesson 24. Protocols and the OSI Model. Objectives At the end of this Presentation, you will be able to:
Networking Basics TCP/IP TRANSPORT and APPLICATION LAYER Version 3.0 Cisco Regional Networking Academy.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
A+ Guide to Software Managing, Maintaining and Troubleshooting THIRD EDITION Chapter 12 Windows on the Internet.
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 19 PCs on the Internet.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
SYSTEM ADMINISTRATION Chapter 7 TCP/IP. Overview (OSI Model Review) The OSI Model is a layered framework that provides structure for data communications.
1 Version 3.0 Module 11 TCP Application and Transport.
Linux+ Guide to Linux Certification Chapter Fifteen Linux Networking.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications ◦The client requested data.
Internet Protocol B Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
TCP/IP (Transmission Control Protocol / Internet Protocol)
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 3: TCP/IP Architecture.
Monitoring Troubleshooting TCP/IP Chapter 3. Objectives for this Chapter Troubleshoot TCP/IP addressing Diagnose and resolve issues related to incorrect.
NetTech Solutions Common Connectivity Problems Lesson Eight.
Using the Communications Program Chapter Thirteen.
1 Bus topology network. 2 Data is sent to all computers, but only the destination computer accepts 02608c
1 Internet Protocols To support the Internet and all its services, many protocols are necessary Some of the protocols that we will look at: –Internet Protocol.
1 Syllabus at a glance – CMCN 6103 Introduction Introduction to Networking Network Fundamentals Number Systems Ethernet IP Addressing Subnetting ARP DNS.
ERICSON BRANDON M. BASCUG Alternate - REGIONAL NETWORK ADMINISTRATOR HOW TO TROUBLESHOOT TCP/IP CONNECTIVITY.
17 Establishing Dial-up Connection to the Internet Using Windows 9x 1.Install and configure the modem 2.Configure Dial-Up Adapter 3.Configure Dial-Up Networking.
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e Chapter 9 Networking Practices.
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
Windows Vista Configuration MCTS : Advanced Networking.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
IST 201 Chapter 11 Lecture 2. Ports Used by TCP & UDP Keep track of different types of transmissions crossing the network simultaneously. Combination.
Chapter Objectives In this chapter, you will learn:
Connecting Desktops and Laptops to Networks
Instructor Materials Chapter 5 Providing Network Services
Level 2 Diploma Unit 10 Setting up an IT Network
A+ Guide to Managing and Maintaining your PC, 6e
Networking for Home and Small Businesses – Chapter 6
Networking for Home and Small Businesses – Chapter 6
Chapter 9 Windows on the Internet
A+ Guide to Managing and Maintaining your PC, 6e
Networking for Home and Small Businesses – Chapter 6
Presentation transcript:

A+ Guide to Software, 4e Chapter 9 Windows on the Internet

A+ Guide to Software, 4e The TCP/IP Suite of Protocols Client/server application –Client application on one PC requests data from server –Server application on another PC returns data Example: World Wide Web –The client is a Web browser –The server is a Web server; e.g., Apache HTTP server –Requested data is a Web page Client applications are installed as programs Server applications are installed as services 2/29

A+ Guide to Software, 4e Using IP and Port Addresses to Identify Services Port (port address, port number) –Number that identifies server application to client –Server application listens for request at assigned port –Example: port 80 is typically assigned to Web servers Port numbers appear at the end of an IP address –Example: :80 A few other common ports and assigned services –Port 20: FTP (File Transfer Protocol) –Port 25: (using SMTP protocol) –Port 443: Web server (using HTTPS protocol) 3/29

A+ Guide to Software, 4e Using IP and Port Addresses to Identify Services (continued) Communication protocol –Defines rules of communication between client/server –Example: POP3 is used by client to receive Information flow between client and server –Application sends request to OS –OS passes request to NIC –NIC places request on network –NIC on receiving end sends request to OS –OS passes request to Web server application –Web server responds by sending data to OS 4/29

A+ Guide to Software, 4e TCP/IP Protocol Layers TCP/IP suite lies between applications and the OS API: application programming interface How application protocols are used –Application makes an API call to the OS –The API causes OS to generate a request Request follows format specified by application protocol –After response is passed back, a session is established Example involving HTTP (Hypertext Transfer Protocol) –Web browser makes an API call to the OS –OS makes an HTTP request for a browser 5/29

A+ Guide to Software, 4e TCP/IP Protocol Layers (continued) Transmission Control Protocol (TCP) –A connection-oriented protocol –Makes a connection, checks delivery, resends data User Datagram Protocol (UDP) –A connectionless or best-effort protocol –Does not guarantee delivery Internet Protocol (IP) –Breaks up and reassembles data into packets –Routes packets to their destination TCP uses IP to establish session and verify delivery 6/29

A+ Guide to Software, 4e TCP/IP Protocol Layers (continued) ARP (Address Resolution Protocol) –Responsible for locating a host on a local network RARP (Reverse Address Resolution Protocol) –Discovers Internet address of host on a local network ICMP (Internet Control Message Protocol) –Communicates problems with a transmission –Example: message deleted due to excessive hops Network protocols used by hardware –Ethernet and PPP (Point-to-Point Protocol) 7/29

A+ Guide to Software, 4e TCP/IP Utilities TCP/IP component includes a group of utilities –Location: Windows or \Winnt folder Commonly used utilities: Ping, Winipcfg, Ipconfig SNMP (Simple Network Management Protocol) –Provides system management tools for networks Microsoft SNMP Agent –Utility installed after TCP/IP is installed –Used to monitor remote connections Tracert (trace route): shows hops along packet route 8/29

A+ Guide to Software, 4e Connecting to the Internet Broadband: supports multiple transmission types Internet Service Provider (ISP) –Connects a PC or network to the Internet Bandwidth technologies used by ISPs: –Regular telephone lines –Cable modem –DSL (Digital Subscriber Line) –ISDN (Integrated Services Digital Network) –Satellite access –Wireless access 9/29

A+ Guide to Software, 4e Cable Modem and DSL Connections Comparing communication media –Cable modem: TV cables shared by multiple users –DSL: dedicated phone lines Comparing service plans –Both: sliding-scale residential and business plans Comparing setup –Both: a modem interfaces PC and broadband jack Comparing installation services: –Both: will install equipment at additional cost 10/29

A+ Guide to Software, 4e Cable Modem and DSL Connections (continued) Overview of installing cable service or DSL –Connect the PC to the cable modem or DSL box –Connect cable modem/DSL box to broadband jack –Plug up power and turn on the broadband device –Configure TCP/IP settings for connection to the ISP –Test connection by using a browser to surf the Web Devices and information needed for an installation –A computer with an available network or USB port –Modem/box and network cable –TCP/IP settings 11/29

A+ Guide to Software, 4e Dial-Up Connections Based on a modem and regular phone line How dial-up networking works –TCP/IP creates data packets for transport –PPP adds its own header and trailer to data packets –PPP presents packet to modem for delivery on line –Process is reversed when data packet is received Overview of setting dial-up in Windows XP –Install an internal or external modem –Launch New Connection Wizard –Follow directions onscreen 12/29

A+ Guide to Software, 4e Dial-Up Connections (continued) A few troubleshooting tips –Plug in a regular phone and check line for a dial tone –Try another phone number –Reboot your PC and try again Overview of setting dial-up in Windows 9x/Me –Dial-Up Networking must first be installed A dial-up adapter will also be installed –Install an internal or external modem –Create connection with Make New Connection Wizard –Configure the connection from Properties dialog box 13/29

A+ Guide to Software, 4e Figure 9-31 Two or more networked computers can share a single Internet connection 14/29

A+ Guide to Software, 4e Implementing a Software Firewall Guidelines for protecting your PC –Keep Windows updates current –Use a software or hardware firewall –Run antivirus software and keep it current Services provided by a hardware or software firewall –Firewalls can filter data packets –Firewalls can filter ports –Firewalls can block certain activity within the network –Firewalls can filter inappropriate information Example of a software firewall: Windows Firewall 15/29

A+ Guide to Software, 4e Using a Router on Your Network Disadvantages of using a host to share a connection –Host computer must always be turned on –Only low-level security for your network –Bottlenecks at host can slow traffic within network Solution: use a router to interface with the Internet Router provides two functions –Takes place of host as gateway to the Internet –Serves a hardware firewall to protect your network 16/29

A+ Guide to Software, 4e Installing and Configuring a Router Run the setup program on any network PC Connect the cable or DSL modem to the router –Follow the instructions on the setup screen Connect PCs on your network to your router –PC can connect directly to a network port –You can also connect a switch or hub to the router Plug in the router and turn it on Sign in with default password and then reset it 17/29

A+ Guide to Software, 4e Installing and Configuring a Router (continued) Configuring a router (using Linksys as an example) –Access configuration program on router firmware Enter the IP address of the router ( ) –View and/or change default settings in Setup window Configure a hardware firewall –Settings in Security tab and Access Restrictions tab Port filtering: open or close certain ports for use Port forwarding –Request to certain ports forwarded to certain PCs –Local PC must have static address for this service 18/29

A+ Guide to Software, 4e Virtual Private Network How VPN security works –Remote user sends id to authentication server –Authentication server encrypts data Various encryption protocols are used; e.g., CHAP –Tunnel is created so all data transferred is encrypted Various tunneling protocols are used; e.g., PPP How to configure a router to support VPN –Select encryption and tunneling protocols –Configure each tunnel the VPN will support Configure client for VPN from Network Connections 19/29

A+ Guide to Software, 4e Supporting Internet Clients Section task: support Internet clients Common Internet clients –Web browsers – –FTP –VoIP –Windows XP Remote Desktop 20/29

A+ Guide to Software, 4e Supporting Web Browsers Web page: text file with an.htm or.html extension –Coded in HTML (Hypertext Markup Language) Web browser: requests pages from a Web server Uniform Resource Locator (URL): Web page address Components of a URL –Protocol, host name, network name, folder, file name –Domain name = host name + network name –Example: Name resolution service relates name to IP address 21/29

A+ Guide to Software, 4e Figure 9-49 A URL contains the protocol used, the host name of the Web server, the network name, and the path and filename of the requested file 22/29

A+ Guide to Software, 4e Table 9-3 Suffixes used to identify top-level domain names 23/29

A+ Guide to Software, 4e Supporting Web Browsers (continued) Solving Internet Explorer problems –First perform routine maintenance; e.g., run ScanDisk –Clean out cache that IE uses to hold temporary files –Suppress downloading images –Repair a corrupted Internet Explorer cache –Run antivirus software –Update Internet Explorer –Verify Windows system files using System File Checker –Remove and reinstall Internet Explorer 6 24/29

A+ Guide to Software, 4e Supporting Web Browsers (continued) Digital certificate: identification plus public key SSL (Secure Sockets Layer) –Encryption system using a digital certificate –Data is encrypted with public key –Data is decrypted with a private key TLS (Transport Layer Security) –An improved version of SSL HTTPS (HTTP secure) –Can mean HTTP over SSL or HTTP over TLS –Indicates secure protocol being used is SSL or TLS 25/29

A+ Guide to Software, 4e Supporting SMTP: Simple Mail Transfer Protocol SMTP AUTH (SMTP Authentication): improved SMTP POP: Post Office Protocol IMAP4: Internet Message Access Protocol, version 4 Route traveled by –Client sends to client server using SMTP –Client server sends to recipient with SMTP –Recipient’s server forwards to recipient Recipient’s server uses POP or IMAP4 Recipient must first login and request from server 26/29

A+ Guide to Software, 4e Supporting FTP File Transfer Protocol (FTP) –Used to transfer files between two computers FTP server (or FTP site) –Application running on another server; e.g., Unix server FTP from a command prompt –Connection to a network must first be established –Some commands: FTP, get yourFile.dat File transfer using FTP software –FTP utility software: can be downloaded from Internet –Web browser: change protocol used in address bar 27/29

A+ Guide to Software, 4e Supporting VoIP VoIP (Voice-over-IP) –Provides voice communication over a network Two types of phones used in VoIP service –Digital telephone: plugs into a network port –Analog phone: needs Analog Telephone Adapter (ATA) Special requirements of VoIP –Phones must be assigned number by VoIP provider –Phones are programmed to use dynamic IP addressing –Each network cable to phone needs a ferrite clamp 28/29

A+ Guide to Software, 4e Figure 9-75 The desktop of the remote computer is available on your local computer 29/29